Android Automotive security assurance in a factory model
Sasken’s Narasimha Bashyam and Debashis Panigrahi explain how to stay on top of Android security releases to maintain customer loyalty.
Sasken’s Narasimha Bashyam and Debashis Panigrahi explain how to stay on top of Android security releases to maintain customer loyalty.
Tero Salminen of OpenSynergy explains how virtualizing a single function increases connected vehicle systems security and makes updating and upgrading software components much more straightforward.
Sasken’s Vasudevan Mukundan and Debashis Panigrahi discuss a cloud-native framework that could scale V2X deployments reliably and securely, reducing cost and time-to-market.
Andrew Coombes and Rohan Pandit of ETAS present a use case of integrating an HSM into a microcontroller hypervisor system.
Elektrobit’s Illia Safiulin provides unique insight into the demands on software solutions needed for new zonal architectures in connected vehicles.
AVL’s Harald Petschnik and Guy Gilam of Cybellum explore the impact of cybersecurity trends on the automotive ecosystem.
Garrett’s Stephane Strahm and Cavy Pan present an IDS software that integrates multi-network and application processor detection-isolation-report-response algorithms.
ESCRYPT’s Dr Moritz Minzlaff and Dr Carolina Adaros of Robert Bosch explain how to build an automotive cybersecurity incident response team.
ESCRYPT experts Joe Cusumano and John McShane discuss automotive-specific fuzzing, a robust testing technique that unmasks hidden security risks in automotive systems.
ESCRYPT’s Rohan Pandit and Suraj Ramachandrappa discuss future market trends and requirements regarding the HSM in the automotive cybersecurity domain towards next-generation vehicle E/E architectures.
Thomas Leifert of Keysight Technologies explains how UNECE WP.29 UN R155 relates to ISO/SAE 21434, the implications to the automotive industry, and how a successful implementation might look.
Paul Wooderson of HORIBA MIRA discusses cybersecurity challenges and solutions when implementing the requirements of the new UNECE Regulation 155 and international standard ISO/SAE 21434.
AVL’s Stefan Marksteiner and Cybellum’s Eyal Traitel explain how cyber digital twins can be automatically derived from automotive components and subsequently used to formulate security tests that verify their cybersecurity.
NXP experts explain why designing ECUs for functional safety, cybersecurity, and AUTOSAR compliance requires an understanding of the embedded hardware and software components available for implementation.
ESCRYPT’s Siddharth Shukla and Andreas Weber discuss different cyber attack prevention techniques and how to combine them with IDS sensors to protect the vehicle E/E architecture.
Experts from ESCRYPT explain why it is essential to use a combination of automated SIEM and human expert teams for fleet security monitoring.
Experts from ESCRYPT provide unique insight into automotive security regulations and standards in China, including MIIT’s critical upcoming regulation.
ESCRYPT’s Jan Holle and Andreas Weber explain why distributed E/E architectures require a distributed IDPS that maps the specific protection needs of the vehicle systems.
Dr. Dennis Kengo Oka outlines a practical step by step guide to building fuzz testing into the CI pipeline using the Zephyr Project RTOS as an example.
SBD Automotive’s Jitesh Joshy and David McClure reveal how true success comes from marrying real-world pen test findings, deep threat modelling expertise, and insight into competitor adoption trends.
Already have a Mobex account? .
* Required field